Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
— The paper presents an approach that combines conceptual and evolutionary techniques to support change impact analysis in source code. Information Retrieval (IR) is used to deri...
Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk,...
While many clever techniques have been proposed for visual analysis, most of these are “one of” and it is not easy to see how to combine multiple techniques. We propose an alg...
Anna A. Shaverdian, Hao Zhou, George Michailidis, ...
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
This is a follow-on to my 1988PLDIpaper, “Control-Flow Analysis e”[9]. Iusethe methodofabstractsemanticinterpretations to explicate the control-flow analysis technique presen...